🔐 CVE Alert

CVE-2025-48503

HIGH 7.8
CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

A DLL hijacking vulnerability in the AMD Software Installer could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

CWE CWE-427
Vendor amd
Product amd ryzen™ 4000 series mobile processors with radeon™ graphics (formerly codenamed "renoir")
Published Feb 11, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for amd amd ryzen™ 4000 series mobile processors with radeon™ graphics (formerly codenamed "renoir")

Be the first to know when new high vulnerabilities affecting amd amd ryzen™ 4000 series mobile processors with radeon™ graphics (formerly codenamed "renoir") are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

AMD / AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Renoir")
All versions affected
AMD / AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics (formerly codenamed "Rembrandt R")
All versions affected
AMD / AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Picasso")
All versions affected
AMD / AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Phoenix")
All versions affected
AMD / AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics (formerly codenamed "Mendocino")
All versions affected
AMD / AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dragon Range")
All versions affected
AMD / AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael X3D")
All versions affected
AMD / AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo R")
All versions affected
AMD / AMD Ryzen™ AI 300 Series Processors (formerly codenamed "Strix Point")
All versions affected
AMD / AMD Ryzen™ 7000 Series Desktop Processors (formerly codenamed "Raphael"/"Raphael-X3D")
All versions affected
AMD / AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed "Phoenix")
All versions affected
AMD / AMD Ryzen™ 8000 Series Desktop Processors (formerly codenamed "Phoenix")
All versions affected
AMD / AMD Ryzen™ 9000 Series Desktop Processors (formerly codenamed "Granite Ridge")
All versions affected
AMD / AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Cezanne")
All versions affected
AMD / AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Lucienne")
All versions affected
AMD / AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Barcelo")
All versions affected
AMD / AMD Ryzen™ 4000 Series Desktop Processors (formerly codenamed "Renoir")
All versions affected
AMD / AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics (formerly codenamed "Cezanne")
All versions affected
AMD / AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Hawk Point")
All versions affected
AMD / AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali")
All versions affected
AMD / AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics (formerly codenamed "Dali")
All versions affected
AMD / AMD Radeon™ RX 5000 Series Graphics Products
All versions affected
AMD / AMD Radeon™ RX 6000 Series Graphics Products
All versions affected
AMD / AMD Radeon™ RX 7000 Series Graphics Products
All versions affected
AMD / Placeholder
All versions affected
AMD / AMD Radeon™ PRO W5000 Series Graphics Products
All versions affected
AMD / AMD Radeon™ PRO W6000 Series Graphics Products
All versions affected
AMD / AMD Radeon™ PRO W7000 Series Graphics Products
All versions affected
AMD / AMD Radeon™ RX 9000 Series Graphics Products
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
amd.com: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html

Credits

Reported through AMD Bug Bounty Program